Category: Threats

Dive into our detailed coverage of various Cyber Threats. Understand the nature of different cyberattacks and how to protect your organization from them.

Datto’s Response to Log4Shell
December 11, 2021

Datto’s Response to Log4Shell

Ryan Weeks

Datto has not assessed any material exposure to the log4j vulnerability that would impact the safe use of Datto products at this time. Should this assessment change, we will update Datto partners immediately.

Read Now
Emotet Malware: How Does it Work and How Can it be Stopped?
December 08, 2021

Emotet Malware: How Does it Work and How Can it be Stopped?

Ofir Yaakobi

Emotet, once described as the “world’s most dangerous malware”, was first discovered as a banking Trojan in 2014 and over the years has evolved into the go-to solution for cybercriminals.

Read Now
What is Bazar Loader and How to Prepare?
November 18, 2021

What is Bazar Loader and How to Prepare?

Rotem Shemesh

Bazar Loader is a fileless attack that downloads through the backdoor allowing attackers to install additional malware, often used for ransomware attacks. Since its inception in April 2020, Bazar Loader has attacked a wide variety of organizations in North America and Europe.

Read Now
Strong Supply Chain Security Starts with Secure Software
November 17, 2021

Strong Supply Chain Security Starts with Secure Software

Emilyann Fogarty

In the past year or so, supply chain attacks have become more prevalent than ever, making vendor security a top-of-mind concern for many organizations.

Read Now
BCDR Recovery Options for Ransomware
August 19, 2021

BCDR Recovery Options for Ransomware

John Maxwell

In this second blog in our series, we look at the various recovery methods for ransomware and highlight the BCDR functionality.

Read Now
The “Power of Two” for Combating Ransomware
August 17, 2021

The “Power of Two” for Combating Ransomware

John Maxwell

This is first of a 3 part series that will focus on ransomware. This first one details the four steps to tackle ransomware and uses examples of both RMM’s ransomware and BCDR recovery.

Read Now
How RMM Tools Help MSPs Combat Ransomware
August 06, 2021

How RMM Tools Help MSPs Combat Ransomware

Courtney Heinbach

There are countless tools available to managed service providers (MSPs) to help them mitigate the risk of ransomware for themselves and their small and medium business (SMB) clients. There’s no single solution that can completely prevent a business from an attack, but rather many that work together. MSPs should consider their RMM tools as a key component in their ransomware mitigations strategy.

Read Now
How MSPs Can Prevent, Detect, and Respond to Ransomware Attacks
July 09, 2021

How MSPs Can Prevent, Detect, and Respond to Ransomware Attacks

Courtney Heinbach

Reality is, there is no foolproof way to prevent a ransomware attack. Even the most protected and prepared businesses can fall victim to ransomware. However, there are steps MSPs can take to lower the chances of their SMB clients being hit with an attack.

Read Now
What is Ryuk Ransomware and How Does it Work?
May 27, 2021

What is Ryuk Ransomware and How Does it Work?

Rotem Shemesh

Here’s everything MSPs and their clients need to know about Ryuk ransomware.

Read Now